April 21, 2023, 4:14 p.m. | Maitreya Ranganath

AWS Security Blog aws.amazon.com

Many of our customers use Amazon Cognito user pools to add authentication, authorization, and user management capabilities to their web and mobile applications. You can enable the built-in advanced security in Amazon Cognito to detect and block the use of credentials that have been compromised elsewhere, and to detect unusual sign-in activity and then prompt users for […]

advanced amazon amazon cognito applications authentication authorization aws aws waf best practices block capabilities cognito compliance compromised credentials customers detect edge enable identity intermediate (200) management mobile mobile applications protect security security blog sign technical how-to user management waf web

More from aws.amazon.com / AWS Security Blog

Security Operations Engineer

@ Nokia | India

Machine Learning DevSecOps Engineer

@ Ford Motor Company | Mexico City, MEX, Mexico

Cybersecurity Defense Analyst 2

@ IDEMIA | Casablanca, MA, 20270

Executive, IT Security

@ CIMB | Cambodia

Cloud Security Architect - Microsoft (m/w/d)

@ Bertelsmann | Gütersloh, NW, DE, 33333

Senior Consultant, Cybersecurity - SOC

@ NielsenIQ | Chennai, India